ITU‐T's Technical Reports and Specifications 711 (4) Other techniques (4.1) Suppression or records To delete records with a special attribute or value. For example, a record which has a value of more than 120 is deleted. (4.2) Supression of cells To delete sensitive attributes such as the attributes which should not be used for analysis. (4.3) Sampling To extract a value randomly from the entire original data at a constant rate or number. (5) Advanced anonymization methods (5.1) k‐anonymization, l‐diversity, l‐closeness These PPDP method is described in the section of Use Cases. (5.2) Pk‐anonymization A method of anonymization that guarantee the probability to point out a personal record is less than 1/k in probability. (6) Application specific anonymization methods (6.1) Battery‐load hiding Battery‐load hiding (BLH) techniques were proposed to ensure household privacy 4748 . BLH hides or obscures real electric consumption by charging and discharging batteries, which are set with each household. This approach tries to keep electric power consumption data constant value and make it impossible to infer real usage of home appliances by NILM. (6.2) Others The anonymization methods explained in section 11 belongs this category. 6 The management of open data in SSC 6.1 Executive institution management Open data is a valuable resource and a strategic asset to the government, its partners, and the public. Due to the existence of institutional mechanisms there are more barriers between information systems, data showing disorderly scattered islands situation, the actual utilization of data is very low. Scattered data means that the data from various agencies and institutions unable to form an open source browser‐based map that enable citizens and enterprise hardly to visualize open data from agencies, institutions and other people. Also, a thorough analysis helps agencies and institutions pinpoint needs, priorities, and existing capabilities for open data. Before the analysis begins, however, ____________________ 47 McLaughlin, S., McDaniel, P., & Aiello, W, Protecting consumer privacy from electric load monitoring; In Proceedings of the 18th ACM conference on Computer and communications security CCS ’11 ,2011. 48 Yang, L., Chen, X., Zhang, J., & Poor, H.; Optimal Privacy‐Preserving Energy Management for Smart Meters, IEEE INFOCOM, 2014,Page(s): 513‐521.